Privacy

Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week and as a result they were hit with more than 44 million hacking attempts. The targeted websites ranged from defense-related sites to several commercial websites. Cyberspace has fast transformed into a battlefield...

Facebook offers new privacy setting indicators for new users In a move that suggests Facebook has begun to marginally accept that it is responsible for user privacy, the social network has revised the manner in which it informs new users about privacy settings. This includes little indicators like ‘light bulbs’...

Government plans for 5 lakh cyber warriors for e-defense Having recognized the need for defense against extensive cyber attacks, the Indian Government has started an initiative to train 5 lakh ‘cyber warriors’ over the next 5 years. The training will include a centralized institute and access to extensive resources to...

AntiSec collects 12 million Apple UDIDs from hacked FBI laptop, FBI denies it! AntiSec, a hacker group associated with Anonymous, claimed to have gotten their hands on 12 million Apple UDIDs from a hacked FBI laptop. They published 1 million of these IDs to validate their claim. However, the FBI...

Fake BlackBerry account activation email A fake BlackBerry account creation email is doing the rounds. The content of the email is the same as a legitimate account creation message sent by RIM, but the attachment with this email is a source of concern. Downloading the attachment can lead to infection...

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....

Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals. If an attacker steals data by intercepting signals it could be crushing, but what if he could actively send signals and command the NFC enabled phone to do as he pleases? This...

Imagine a scenario where a customer walks into a supermarket to buy groceries. She receives a greeting and a list of offers and discounts for the day on her phone. The store then prepares a customizable shopping list based on past purchases. The store then provides an in-depth mapped shopping...

Location mapping is a highly useful tool to study social behavior but it also poses a real threat to the privacy of individuals. GPS signals collected via smartphones are just the tip of the iceberg. The latest location mapping tool, known as Indoor Positioning System (IPS), makes use of Wi-Fi...